Distributed Detection and Data Fusion
Distributed Detection and Data Fusion
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
FOCS '02 Proceedings of the 43rd Symposium on Foundations of Computer Science
Estimation with Applications to Tracking and Navigation
Estimation with Applications to Tracking and Navigation
International Journal of Sensor Networks
Cognitive Radio Networks
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Hi-index | 0.00 |
In Cognitive Radio Networks (CRNs), there are some new attacks. For instance, an attacker may modify the air interface of a CRN to mimic primary signal's characteristics, thereby causing legitimate Secondary Users (SUs) to erroneously identify the attacker as a Primary User (PU). Most CRNs rely on Common Control Channel (CCC) to allocate channels. An attacker can saturate CCC to make control message exchange difficult. This paper analyses attacks specific to CRN and the countermeasures. We will focus on anti-attack schemes of low layers, i.e., physical and MAC layers. We propose several enhancements to secure CRN.